id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-r39c-x95w-6gc8
In Quest KACE Systems Management Appliance (SMA) through 12.0, a hash collision is possible during authentication. This may allow authentication with invalid credentials.
[]
null
9.8
null
null
GHSA-gg88-333c-97wf
The Backup, Restore and Migrate WordPress Sites With the XCloner Plugin plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 4.7.3. This is due the plugin utilizing sabre without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
[]
null
5.3
null
null
CVE-2017-0004
The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to cause a denial of service (reboot) via a crafted authentication request, aka "Local Security Authority Subsystem Service Denial of Service Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
null
7.5
7.8
CVE-2025-2631
Out of Bounds Write Vulnerability in NI LabVIEW in InitCPUInformation()
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
[]
8.5
7.8
null
null
GHSA-ggx6-2xxf-36qq
Adobe Reader and Acrobat before 11.0.16, Acrobat and Acrobat Reader DC Classic before 15.006.30172, and Acrobat and Acrobat Reader DC Continuous before 15.016.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1037, CVE-2016-1063, CVE-2016-1064, CVE-2016-1071, CVE-2016-1072, CVE-2016-1073, CVE-2016-1074, CVE-2016-1076, CVE-2016-1077, CVE-2016-1078, CVE-2016-1080, CVE-2016-1081, CVE-2016-1082, CVE-2016-1083, CVE-2016-1084, CVE-2016-1085, CVE-2016-1086, CVE-2016-1088, CVE-2016-1093, CVE-2016-1095, CVE-2016-1116, CVE-2016-1118, CVE-2016-1119, CVE-2016-1120, CVE-2016-1123, CVE-2016-1124, CVE-2016-1125, CVE-2016-1126, CVE-2016-1127, CVE-2016-1128, CVE-2016-1129, CVE-2016-1130, CVE-2016-4088, CVE-2016-4089, CVE-2016-4090, CVE-2016-4093, CVE-2016-4094, CVE-2016-4096, CVE-2016-4097, CVE-2016-4098, CVE-2016-4099, CVE-2016-4100, CVE-2016-4101, CVE-2016-4103, and CVE-2016-4105.
[]
null
null
9.8
null
CVE-2019-1233
A denial of service vulnerability exists in Microsoft Exchange Server software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Denial of Service Vulnerability'.
[ "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_13:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*" ]
null
7.5
null
7.8
GHSA-fg88-qmgw-rwmp
Cross-site scripting (XSS) vulnerability in Xerox MicroServer Web Server in Document Centre 220 through 265, 332 and 340, 420 through 490, and 535 through 555 allows remote attackers to inject arbitrary web script or HTML and modify web pages via unknown vectors.
[]
null
null
null
null
GHSA-mhv8-2q5p-jrwx
An issue was discovered in baijiacms v4. There is a CSRF vulnerability that can modify the store information and login password.
[]
null
6.5
null
null
GHSA-8mrq-m68x-jfcm
The vulnerability allows a malicious low-privileged PAM user to perform server upgrade related actions.
[]
5.1
null
null
null
CVE-2021-40024
Implementation of the WLAN module interfaces has the information disclosure vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
[ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-px78-xv49-wxhw
MySimpleNews 1.0 allows remote attackers to delete arbitrary email messages via a direct request to vider.php3.
[]
null
null
null
null
GHSA-rhvr-6w8c-6v7w
Mattermost fails to invalidate all active sessions when converting a user to a bot
Mattermost versions 9.11.x <= 9.11.6, 10.4.x <= 10.4.1 fail to invalidate all active sessions when converting a user to a bot, with allows the converted user to escalate their privileges depending on the permissions granted to the bot.
[]
null
3.1
null
null
CVE-2023-2690
SourceCodester Personnel Property Equipment System GET Parameter returned_reuse_form.php sql injection
A vulnerability, which was classified as critical, has been found in SourceCodester Personnel Property Equipment System 1.0. This issue affects some unknown processing of the file admin/returned_reuse_form.php of the component GET Parameter Handler. The manipulation of the argument client_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228971.
[ "cpe:2.3:a:personnel_property_equipment_system_project:personnel_property_equipment_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-34wv-v24v-vm88
An issue was discovered on Belkin Wemo Switch 28B WW_2.00.11057.PVT-OWRT-SNS devices. They allow remote attackers to cause a denial of service (persistent rules-processing outage) via a crafted ruleDbBody element in a StoreRules request to the upnp/control/rules1 URI, because database corruption occurs.
[]
null
null
null
null
GHSA-f2vf-33g3-fwm2
The Salon Booking System, Appointment Scheduling for Salons, Spas & Small Businesses WordPress plugin before 1.9.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
4.8
null
null
RHSA-2022:5192
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
argocd: vulnerable to an uncontrolled memory consumption bug argocd: vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or the UI. argocd: cross-site scripting (XSS) allow a malicious user to inject a javascript link in the UI argocd: vulnerable to a symlink following bug allowing a malicious user with repository write access
[ "cpe:/a:redhat:openshift_gitops:1.3::el8" ]
null
4.3
null
null
GHSA-5cv5-75c5-879q
MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
[]
null
null
null
null
GHSA-8mqm-pq95-4fc3
/usr/libexec/openldap/generate-server-cert.sh in openldap-servers sets weak permissions for the TLS certificate, which allows local users to obtain the TLS certificate by leveraging a race condition between the creation of the certificate, and the chmod to protect it.
[]
null
null
4.7
null
GHSA-q5ff-63c8-hcx3
In ffu_flash_pack of ffu.c, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
[]
null
5.1
null
null
CVE-2006-0163
SQL injection vulnerability in the search module (modules/Search/index.php) of PHPNuke EV 7.7 -R1 allows remote attackers to execute arbitrary SQL commands via the query parameter, which is used by the search field. NOTE: This is a different vulnerability than CVE-2005-3792.
[ "cpe:2.3:a:francisco_burzi:php-nuke_ev:7.7_r1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-17602
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
[ "cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:-:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124000:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124011:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124012:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124013:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124014:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124015:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124016:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124022:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124023:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124024:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124025:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124026:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124027:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124030:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124033:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124037:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124039:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124040:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124041:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124042:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124043:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124051:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124053:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124054:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124056:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124058:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124065:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124066:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124067:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124069:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124070:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124071:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124074:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124075:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124081:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124082:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124085:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124086:*:*:*:*:*:*", "cpe:2.3:a:zohocorp:manageengine_opmanager:12.4:build124087:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-mqwc-9q6f-pv6q
Directory traversal vulnerability in ver.2.8.4.0 and earlier and ver.3.3.0.0 and earlier allows an attacker to create or overwrite existing files via specially crafted ATC file.
[]
null
null
5.5
null
CVE-2018-20346
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
[ "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" ]
null
null
8.1
6.8
CVE-2025-27342
WordPress WooCommerce Recargo de Equivalencia Plugin <= 1.6.24 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in josesan WooCommerce Recargo de Equivalencia allows Cross Site Request Forgery. This issue affects WooCommerce Recargo de Equivalencia: from n/a through 1.6.24.
[]
null
4.3
null
null
CVE-2024-31087
WordPress pageMash plugin <= 1.3.0 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joel Starnes pageMash > Page Management allows Reflected XSS.This issue affects pageMash > Page Management: from n/a through 1.3.0.
[]
null
7.1
null
null
CVE-2007-0884
Buffer overflow in Roaring Penguin MIMEDefang 2.59 and 2.60 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via unspecified vectors.
[ "cpe:2.3:a:roaring_penguin:mimedefang:2.59:*:*:*:*:*:*:*", "cpe:2.3:a:roaring_penguin:mimedefang:2.60:*:*:*:*:*:*:*" ]
null
null
null
7.5
RHSA-2023:7373
Red Hat Security Advisory: tigervnc security update
xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
7.8
null
null
GHSA-6cvr-wmr3-636f
Transient DOS while decoding attach reject message received by UE, when IEI is set to ESM_IEI.
[]
null
7.5
null
null
GHSA-gw3c-jrpr-59hg
Xenstore: Guests can create orphaned Xenstore nodes By creating multiple nodes inside a transaction resulting in an error, a malicious guest can create orphaned nodes in the Xenstore data base, as the cleanup after the error will not remove all nodes already created. When the transaction is committed after this situation, nodes without a valid parent can be made permanent in the data base.
[]
null
5.5
null
null
GHSA-hmww-m5wm-539p
Inappropriate authorization vulnerability in the system apps. Successful exploitation of this vulnerability may affect service integrity.
[]
null
7.5
null
null
CVE-2013-7406
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:mrbs_project:mrbs:1.4.0:*:*:*:*:drupal:*:*", "cpe:2.3:a:mrbs_project:mrbs:1.4.8:*:*:*:*:drupal:*:*" ]
null
null
null
7.5
CVE-2014-3421
lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
[ "cpe:2.3:o:mageia_project:mageia:3:*:*:*:*:*:*:*", "cpe:2.3:o:mageia_project:mageia:4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:*:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:20.0:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:20.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:20.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:20.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:20.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:20.5:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:20.6:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:20.7:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:21:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:21.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:21.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:21.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:21.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:21.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:21.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:22.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:22.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:22.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:23.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:23.2:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:23.3:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:23.4:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:24.1:*:*:*:*:*:*:*", "cpe:2.3:a:gnu:emacs:24.2:*:*:*:*:*:*:*" ]
null
null
null
3.3
RHSA-2023:3465
Red Hat Security Advisory: kernel security and bug fix update
kernel: net/ulp: use-after-free in listening ULP sockets kernel: udmabuf: improper validation of array index leading to local privilege escalation kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/o:redhat:rhel_eus:9.0::baseos" ]
null
7.8
null
null
CVE-2007-3923
The Common Internet File System (CIFS) optimization in Cisco Wide Area Application Services (WAAS) 4.0.7 and 4.0.9, as used by Cisco WAE appliance and the NM-WAE-502 network module, when Edge Services are configured, allows remote attackers to cause a denial of service (loss of service) via a flood of TCP SYN packets to port (1) 139 or (2) 445.
[ "cpe:2.3:h:cisco:wide_area_application_engine:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:wide_area_application_engine_nm-wae-502:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wide_area_application_services:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wide_area_application_services:4.0.9:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2013-2218
Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command.
[ "cpe:2.3:a:redhat:libvirt:1.0.6:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-22272
Improper authorization in TelephonyManager prior to SMR Jan-2022 Release 1 allows attackers to get IMSI without READ_PRIVILEGED_PHONE_STATE permission
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*" ]
null
4
null
null
CVE-2006-5734
Multiple PHP remote file inclusion vulnerabilities in ATutor 1.5.3.2 allow remote attackers to execute arbitrary PHP code via a URL in the (1) section parameter in (a) documentation/common/frame_toc.php and (b) documentation/common/search.php, the (2) req_lang parameter in documentation/common/search.php and (c) documentation/common/vitals.inc.php, the (3) row[dir_name] parameter in (d) include/classes/module/module.class.php, and the (4) lang_path parameter in (e) include/classes/phpmailer/class.phpmailer.php. NOTE: the print.php vector is already covered by CVE-2005-3404.
[ "cpe:2.3:a:adaptive_technology_resource_centre:atutor:1.5.3.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-3368-73h5-mjmr
The Premium Addons for Elementor plugin for WordPress is vulnerable to Arbitrary Option Updates in versions up to, and including, 4.5.1. This is due to missing capability and nonce checks in the pa_dismiss_admin_notice AJAX action. This makes it possible for authenticated subscriber+ attackers to change arbitrary options with a restricted value of 1 on vulnerable WordPress sites.
[]
null
6.5
null
null
GHSA-8p36-54g9-43pf
Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-6342.
[]
null
null
null
null
RHSA-2023:6197
Red Hat Security Advisory: thunderbird security update
Mozilla: Queued up rendering could have allowed websites to clickjack Mozilla: Large WebGL draw could have led to a crash Mozilla: WebExtensions could open arbitrary URLs Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 Mozilla: Address bar spoofing via bidirectional characters libvpx: crash related to VP9 encoding in libvpx
[ "cpe:/a:redhat:rhel_aus:8.2::appstream", "cpe:/a:redhat:rhel_e4s:8.2::appstream", "cpe:/a:redhat:rhel_tus:8.2::appstream" ]
null
7.5
null
null
GHSA-hv6f-36rr-r48j
The EFBP_verify_upload_file AJAX action of the Easy Form Builder WordPress plugin through 1.0, available to authenticated users, does not have any security in place to verify uploaded files, allowing low privilege users to upload arbitrary files, leading to RCE.
[]
null
null
null
null
CVE-2024-55637
Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-007
Deserialization of Untrusted Data vulnerability in Drupal Core allows Object Injection.This issue affects Drupal Core: from 8.0.0 before 10.2.11, from 10.3.0 before 10.3.9, from 11.0.0 before 11.0.8. Drupal core contains a chain of methods that is exploitable when an insecure deserialization vulnerability exists on the site. This so-called gadget chain presents no direct threat but is a vector that can be used to achieve remote code execution if the application deserializes untrusted data due to another vulnerability.
[]
null
9.8
null
null
CVE-2025-24236
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to access sensitive user data.
[]
null
5.5
null
null
RHSA-2022:1264
Red Hat Security Advisory: Red Hat OpenStack Platform 13.0 (python-waitress) security update
waitress: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
[ "cpe:/a:redhat:openstack:13::el7" ]
null
7.5
null
null
CVE-2019-2941
Vulnerability in the Hyperion Profitability and Cost Management product of Oracle Hyperion (component: Modeling). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Profitability and Cost Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Hyperion Profitability and Cost Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion Profitability and Cost Management accessible data as well as unauthorized read access to a subset of Hyperion Profitability and Cost Management accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:hyperion_enterprise_performance_management_architect:11.1.2.4:*:*:*:*:*:*:*" ]
null
4
null
3.6
CVE-2005-1677
Unknown vulnerability in Groove Virtual Office before 3.1 build 2338, before 3.1a build 2364, and Groove Workspace before 2.5n build 1871 allows remote attackers to bypass restrictions on COM objects.
[ "cpe:2.3:a:groove:groove_workspace:*:*:*:*:*:*:*:*", "cpe:2.3:a:groove:virtual_office:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-mmq7-3rpr-64pv
TURCK BL20 Programmable Gateway and BL67 Programmable Gateway have hardcoded accounts, which allows remote attackers to obtain administrative access via an FTP session.
[]
null
null
null
null
GHSA-qjjp-gpj3-qwwr
Vulnerability in the Primavera P6 Enterprise Project Portfolio Management product of Oracle Construction and Engineering (component: Web Access). Supported versions that are affected are 20.12.1.0-20.12.21.5, 21.12.1.0-21.12.20.0, 22.12.1.0-22.12.16.0 and 23.12.1.0-23.12.10.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Primavera P6 Enterprise Project Portfolio Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Primavera P6 Enterprise Project Portfolio Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera P6 Enterprise Project Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera P6 Enterprise Project Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
[]
null
5.4
null
null
CVE-2018-13660
The mint function of a smart contract implementation for BillionRewardsToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:billionrewardstoken_project:billionrewardstoken:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2005-4822
SQL injection vulnerability in projects/project-edit.asp in Digger Solutions Intranet Open Source (IOS) version 2.7.2 allows remote attackers to execute arbitrary SQL commands via the project_id parameter.
[ "cpe:2.3:a:digger_solutions:intranet_open_source:2.7.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-3qcc-7w94-cc7w
SQL injection vulnerability in DWdirectory 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the search parameter to the /search URI.
[]
null
null
null
null
GHSA-gxf5-48mh-hgpm
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.1 is vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 219510.
[]
null
9.8
null
null
GHSA-9vv4-43m2-mhhp
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the ifname parameter in the apcli_do_enr_pbc_wps function.
[]
null
6.5
null
null
CVE-2008-0253
SQL injection vulnerability in full_text.php in Binn SBuilder allows remote attackers to execute arbitrary SQL commands via the nid parameter.
[ "cpe:2.3:a:binn:sbuilder:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cmxv-46jr-p425
Directory traversal vulnerability in index.php in PHP Multiple Newsletters 2.7, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.
[]
null
null
null
null
CVE-2023-32101
WordPress Library Viewer Plugin <= 2.0.6 is vulnerable to Open Redirection
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Pexle Chris Library Viewer.This issue affects Library Viewer: from n/a through 2.0.6.
[ "cpe:2.3:a:pexlechris:library_viewer:*:*:*:*:*:wordpress:*:*" ]
null
4.7
null
null
GHSA-23jc-43ph-xg8h
An out-of-bounds access vulnerability in the Unauthorized Change Prevention service of Trend Micro Apex One and Apex One as a Service could allow a local attacker to elevate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
[]
null
7.8
null
null
GHSA-78gc-w4gp-4799
The kernel in Apple iOS before 8.1.3, Apple OS X before 10.10.2, and Apple TV before 7.0.3 does not enforce the read-only attribute of a shared memory segment during use of a custom cache mode, which allows attackers to bypass intended access restrictions via a crafted app.
[]
null
null
null
null
CVE-2024-45650
IBM Security Verify Directory denial of service
IBM Security Verify Directory 10.0 through 10.0.3 is vulnerable to a denial of service when sending an LDAP extended operation.
[ "cpe:2.3:a:ibm:security_verify_directory:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_verify_directory:10.0.3:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-r5gf-w27r-jjqq
PHP remote file inclusion vulnerability in add-ons/modules/sysmanager/plugins/install.plugin.php in Aurora CMS 1.0.2 allows remote attackers to execute arbitrary PHP code via a URL in the AURORA_MODULES_FOLDER parameter.
[]
null
null
null
null
GHSA-64gv-qg2v-vxv6
Array size is not checked in sized-chunks
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with From<InlineArray<A, T>>.
[]
null
7.5
null
null
GHSA-2qrj-g9hq-chph
Umbraco.Forms has HTML injection vulnerability in 'Send email' workflow
ImpactThe 'Send email' workflow does not HTML encode the user-provided field values in the sent email message, making any form with this workflow configured vulnerable, as it allows sending the message from a trusted system and address (potentially bypassing spam and email client security systems).PatchesThis issue affects all (supported) versions Umbraco Forms and is patched in 13.4.2 and 15.1.2.WorkaroundsUnpatched or unsupported versions can workaround this issue by using the 'Send email with template (Razor)' workflow instead or [writing a custom workflow type](https://docs.umbraco.com/umbraco-forms/developer/extending/adding-a-workflowtype).To avoid accidentally using the vulnerable workflow again, the `SendEmail` workflow type can be removed using the following composer (tested on Umbraco 10, 13, 14 and 15):
[]
2.3
0
null
null
GHSA-cg6w-97rj-9hvv
Lack of escaping allowed HTML injection when a webpage was viewed in Reader View. While a Content Security Policy prevents direct code execution, HTML injection is still possible. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 88.
[]
null
null
null
null
GHSA-v3pv-ppv6-v9rf
Due to missing encoding in SAP Contact Center's Communication Desktop component- version 700, an attacker could send malicious script in chat message. When the message is accepted by the chat recipient, the script gets executed in their scope. Due to the usage of ActiveX in the application, the attacker can further execute operating system level commands in the chat recipient's scope. This could lead to a complete compromise of their confidentiality, integrity, and could temporarily impact their availability.
[]
null
null
null
null
GHSA-hghm-3vc3-hppj
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.
[]
null
5.6
null
null
GHSA-24pg-vqrw-x656
Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability
[]
null
8.8
null
null
GHSA-mggc-5qcw-3q96
SQL injection vulnerability in Infinity WEB 1.0 allows remote attackers to bypass authentication and gain privileges via the login page.
[]
null
null
null
null
CVE-2002-1872
Microsoft SQL Server 6.0 through 2000, with SQL Authentication enabled, uses weak password encryption (XOR), which allows remote attackers to sniff and decrypt the password.
[ "cpe:2.3:a:microsoft:sql_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:7.0:sp4:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sql_server:2000:sp2:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2025-30793
WordPress Houzez Property Feed plugin <= 2.5.4 - Arbitrary File Download Vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Property Hive Houzez Property Feed allows Path Traversal. This issue affects Houzez Property Feed: from n/a through 2.5.4.
[]
null
7.5
null
null
CVE-2005-3399
Multiple interpretation error in CAT-QuickHeal 8.0 allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
[ "cpe:2.3:a:cat:quick_heal:8.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2014-6873
The AMGC (aka com.amec.uae) application 6.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:amecuae:amgc:6:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-h55q-7cr6-wwr6
The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
[]
null
null
3.8
null
CVE-2010-1215
Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
[ "cpe:2.3:a:mozilla:firefox:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2021-21106
Use after free in autofill in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
9.6
null
9.3
GHSA-hwwj-8rjh-78m2
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in LambertGroup SHOUT allows SQL Injection. This issue affects SHOUT: from n/a through 3.5.3.
[]
null
8.5
null
null
CVE-2015-0206
Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
[ "cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.0o:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*", "cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-23f5-whxg-92j5
Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.
[]
null
null
null
null
CVE-2009-0041
IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
[ "cpe:2.3:a:asterisk:asterisk_business_edition:*:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:*:beta8:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:a:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:b.2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:*:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:*:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:*:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.0beta1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.0beta2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.2:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.3:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.10:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.11:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.11:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.12:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.12.1:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.13:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.13:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.14:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.14:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.15:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.15:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.16:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.16:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.17:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.17:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.18:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.18:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.19:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.19:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.20:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.20:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.21:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.21:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.21.1:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.22:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.22:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.23:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.23:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.24:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.24:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.25:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.25:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.26:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.26:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.26.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.26.1:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.26.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.26.2:netsec:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.27:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.28:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.29:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.30:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.30.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.2.30.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.19:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.19:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.19:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.19:rc4:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.20:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.20:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.21:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.21:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.22:rc3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.22:rc4:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.23:rc1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4.23:rc2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4_revision_95946:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.4beta:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta7.1:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:beta9:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:open_source:1.6.0.3:*:*:*:*:*:*:*", "cpe:2.3:h:asterisk:s800i_appliance:1.2:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-mm8m-pwcf-xh4m
An elevation of privilege vulnerability in the Qualcomm bus driver in Android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Android ID: A-30311977. References: Qualcomm QC-CR#1050455.
[]
null
null
7.8
null
PYSEC-2014-5
null
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a denial of service (CPU consumption) by unloading a multiple files with the same name.
[]
null
null
null
null
GHSA-7w8r-vmhh-7vf4
Cross-site scripting (XSS) vulnerability in the administrative interface in Cisco WebEx Meetings Server 2.5 and 2.5.0.997 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCuq86310.
[]
null
null
null
null
CVE-2024-3436
SourceCodester Prison Management System Avatar edit-photo.php unrestricted upload
A vulnerability was found in SourceCodester Prison Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /Admin/edit-photo.php of the component Avatar Handler. The manipulation of the argument avatar leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259630 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:sourcecodester:prison_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
CVE-2024-25632
Unauthorised granting of administrator privileges over arbitrary teams under certain circumstances
eLabFTW is an open source electronic lab notebook for research labs. In the context of eLabFTW, an administrator is a user account with certain privileges to manage users and content in their assigned team/teams. A user may be an administrator in one team and a regular user in another. The vulnerability allows a regular user to become administrator of a team where they are a member, under a reasonable configuration. Additionally, in eLabFTW versions subsequent to v5.0.0, the vulnerability may allow an initially unauthenticated user to gain administrative privileges over an arbitrary team. The vulnerability does not affect system administrator status. Users should upgrade to version 5.1.0. System administrators are advised to turn off local user registration, saml_team_create and not allow administrators to import users into teams, unless strictly required.
[]
null
8.6
null
null
GHSA-824c-c5r2-qg3x
Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
[]
null
8.1
null
null
GHSA-xm67-587q-r2vw
wasmtime vulnerable to miscompilation of `i8x16.select` with the same inputs on x86_64
ImpactWasmtime's code generation backend, Cranelift, has a bug on x86_64 platforms for the WebAssembly `i8x16.select` instruction which will produce the wrong results when the same operand is provided to the instruction and some of the selected indices are greater than 16. There is an off-by-one error in the calculation of the mask to the `pshufb` instruction which causes incorrect results to be returned if lanes are selected from the second vector.The impact of this miscompilation is that the WebAssembly instruction can produce incorrect results for the `i8x16.select` instruction. This should have no effect on embedders and does not represent a sandbox escape, for example. Guest programs, however, may behave unexpectedly due to the incorrect result of this instruction. In extreme cases if a guest program is handling untrusted input then the guest program may deviate from its intended execution, for example calling an imported host function with different arguments than intended. This still does not impact embedders, however, because there is no form of privilege escalation with the guest.At this time it's expected that this codegen pattern doesn't show up in the wild that often. LLVM-generated modules, for example, do not appear to conventionally or idiomatically generate code which would hit this bug. It is possible, however, to still write code which triggers this, so it's recommended for embedders to analyze existing modules to see if any are affected.PatchesThis codegen bug has been fixed in Wasmtime 6.0.1, 5.0.1, and 4.0.1. Users are recommended to upgrade to these updated versions.WorkaroundsIf upgrading is not an option for you at this time, you can avoid this miscompilation by [disabling the Wasm simd proposal](https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.wasm_simd)Additionally the bug is only present on x86_64 hosts. Other platforms such as AArch64 and s390x are not affected.References[The WebAssembly simd proposal](https://github.com/webassembly/simd)[Mailing list announcement](https://groups.google.com/a/bytecodealliance.org/g/sec-announce/c/Mov-ItrNJsQ)[GitHub advisory](https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-xm67-587q-r2vw)[Commit to fix this issue on Wasmtime's `main` branch](https://github.com/bytecodealliance/wasmtime/commit/5dc2bbccbb363e474d2c9a1b8e38a89a43bbd5d1)For more informationIf you have any questions or comments about this advisory:Reach out to us on [the Bytecode Alliance Zulip chat](https://bytecodealliance.zulipchat.com/#narrow/stream/217126-wasmtime)Open an issue in [the bytecodealliance/wasmtime repository](https://github.com/bytecodealliance/wasmtime/)
[]
null
3.1
null
null
CVE-2021-35214
Session Management Vulnerability
The vulnerability in SolarWinds Pingdom can be described as a failure to invalidate user session upon password or email address change. When running multiple active sessions in separate browser windows, it was observed a password or email address change could be changed without terminating the user session. This issue has been resolved on September 13, 2021.
[ "cpe:2.3:a:solarwinds:pingdom:*:*:*:*:*:*:*:*" ]
null
4.8
null
null
CVE-2023-2303
The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[ "cpe:2.3:a:vcita:contact_form_and_calls_to_action_by_vcita:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-4fcv-w3qc-ppgg
rust-openssl Use-After-Free in `Md::fetch` and `Cipher::fetch`
When a `Some(...)` value was passed to the `properties` argument of either of these functions, a use-after-free would result.In practice this would nearly always result in OpenSSL treating the properties as an empty string (due to `CString::drop`'s behavior).The maintainers thank [quitbug](https://github.com/quitbug/) for reporting this vulnerability to us.
[]
6.3
null
null
null
GHSA-m4w3-m27v-5467
Rejected reason: To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used.
[]
null
null
null
null
GHSA-c22m-cqmp-648p
Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: Shopping Cart). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
[]
null
null
null
null
GHSA-cf7m-hm28-rpmp
The All in One SEO WordPress plugin before 4.1.5.3 is affected by a Privilege Escalation issue, which was discovered during an internal audit by the Jetpack Scan team, and may grant bad actors access to protected REST API endpoints they shouldn’t have access to. This could ultimately enable users with low-privileged accounts, like subscribers, to perform remote code execution on affected sites.
[]
null
8.8
null
null
GHSA-gmwx-qv5p-38rc
An Improper Release of Memory Before Removing Last Reference vulnerability in the Session Initiation Protocol (SIP) Application Layer Gateway (ALG) of Juniper Networks Junos OS allows unauthenticated network-based attacker to cause a partial Denial of Service (DoS). On all MX and SRX platforms, if the SIP ALG is enabled, receipt of a specific SIP packet will create a stale SIP entry. Sustained receipt of such packets will cause the SIP call table to eventually fill up and cause a DoS for all SIP traffic. The SIP call usage can be monitored by "show security alg sip calls". To be affected the SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. Please verify on SRX with: user@host> show security alg status | match sip SIP : Enabled Please verify on MX whether the following is configured: [ services ... rule <rule-name> (term <term-name>) from/match application/application-set <name> ] where either a. name = junos-sip or an application or application-set refers to SIP: b. [ applications application <name> application-protocol sip ] or c. [ applications application-set <name> application junos-sip ] This issue affects Juniper Networks Junos OS on SRX Series and MX Series: 20.4 versions prior to 20.4R3-S2; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R2-S2; 21.2 versions prior to 21.2R3; 21.3 versions prior to 21.3R2; 21.4 versions prior to 21.4R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
[]
null
5.3
null
null
CVE-2025-37864
net: dsa: clean up FDB, MDB, VLAN entries on unbind
In the Linux kernel, the following vulnerability has been resolved: net: dsa: clean up FDB, MDB, VLAN entries on unbind As explained in many places such as commit b117e1e8a86d ("net: dsa: delete dsa_legacy_fdb_add and dsa_legacy_fdb_del"), DSA is written given the assumption that higher layers have balanced additions/deletions. As such, it only makes sense to be extremely vocal when those assumptions are violated and the driver unbinds with entries still present. But Ido Schimmel points out a very simple situation where that is wrong: https://lore.kernel.org/netdev/ZDazSM5UsPPjQuKr@shredder/ (also briefly discussed by me in the aforementioned commit). Basically, while the bridge bypass operations are not something that DSA explicitly documents, and for the majority of DSA drivers this API simply causes them to go to promiscuous mode, that isn't the case for all drivers. Some have the necessary requirements for bridge bypass operations to do something useful - see dsa_switch_supports_uc_filtering(). Although in tools/testing/selftests/net/forwarding/local_termination.sh, we made an effort to popularize better mechanisms to manage address filters on DSA interfaces from user space - namely macvlan for unicast, and setsockopt(IP_ADD_MEMBERSHIP) - through mtools - for multicast, the fact is that 'bridge fdb add ... self static local' also exists as kernel UAPI, and might be useful to someone, even if only for a quick hack. It seems counter-productive to block that path by implementing shim .ndo_fdb_add and .ndo_fdb_del operations which just return -EOPNOTSUPP in order to prevent the ndo_dflt_fdb_add() and ndo_dflt_fdb_del() from running, although we could do that. Accepting that cleanup is necessary seems to be the only option. Especially since we appear to be coming back at this from a different angle as well. Russell King is noticing that the WARN_ON() triggers even for VLANs: https://lore.kernel.org/netdev/[email protected]/ What happens in the bug report above is that dsa_port_do_vlan_del() fails, then the VLAN entry lingers on, and then we warn on unbind and leak it. This is not a straight revert of the blamed commit, but we now add an informational print to the kernel log (to still have a way to see that bugs exist), and some extra comments gathered from past years' experience, to justify the logic.
[]
null
null
null
null
CVE-2017-7899
An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. User credentials are sent to the web server using the HTTP GET method, which may result in the credentials being logged. This could make user credentials available for unauthorized retrieval.
[ "cpe:2.3:a:rockwellautomation:1763-l16awa_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1763-l16awa_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1763-l16bbb_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1763-l16bbb_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1763-l16bwa_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1763-l16bwa_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1763-l16dwd_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1763-l16dwd_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:ab_micrologix_controller:1100:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32awa_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32awa_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32awaa_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32awaa_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32bwa_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32bwa_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32bwaa_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32bwaa_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32bxb_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32bxb_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32bxba_series_a:*:*:*:*:*:*:*:*", "cpe:2.3:a:rockwellautomation:1766-l32bxba_series_b:*:*:*:*:*:*:*:*", "cpe:2.3:h:rockwellautomation:ab_micrologix_controller:1400:*:*:*:*:*:*:*" ]
null
null
9.8
5
GHSA-m63c-qqgh-g8hh
Missing Authorization vulnerability in WP Desk Flexible Checkout Fields for WooCommerce.This issue affects Flexible Checkout Fields for WooCommerce: from n/a through 4.1.2.
[]
null
4.3
null
null
GHSA-3p9g-q4q3-x6mr
Cross-site scripting (XSS) vulnerability in edit.php in wellyblog allows remote attackers to inject arbitrary web script or HTML via the articleid parameter in an add action.
[]
null
null
null
null
CVE-2022-47166
WordPress Void Contact Form 7 Widget For Elementor Page Builder Plugin <= 2.1.1 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in voidCoders Void Contact Form 7 Widget For Elementor Page Builder plugin <= 2.1.1 versions.
[ "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
GHSA-9mvq-97pq-fpww
In bnep_process_control_packet of bnep_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69177292.
[]
null
null
7.5
null
RHSA-2024:8906
Red Hat Security Advisory: Satellite 6.16.0 release
micromatch: vulnerable to Regular Expression Denial of Service github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp puppet-foreman: An authentication bypass vulnerability exists in Foreman grpc: client communicating with a HTTP/2 proxy can poison the HPACK table between the proxy and the backend puppet-pulpcore: An authentication bypass vulnerability exists in pulpcore mosquitto: sending specific sequences of packets may trigger memory leak foreman: Read-only access to entire DB from templates node-tar: denial of service while parsing a tar file due to lack of folders depth validation urllib3: proxy-authorization request header is not stripped during cross-origin redirects python-django: Potential denial-of-service in django.utils.html.urlize() python-django: Username enumeration through timing difference for users with unusable passwords python-django: Potential directory-traversal in django.core.files.storage.Storage.save() python-django: Potential denial-of-service in django.utils.translation.get_supported_language_variant() python-django: Potential SQL injection in QuerySet.values() and values_list()
[ "cpe:/a:redhat:satellite:6.16::el8", "cpe:/a:redhat:satellite:6.16::el9", "cpe:/a:redhat:satellite_capsule:6.16::el8", "cpe:/a:redhat:satellite_capsule:6.16::el9", "cpe:/a:redhat:satellite_maintenance:6.16::el8", "cpe:/a:redhat:satellite_maintenance:6.16::el9", "cpe:/a:redhat:satellite_utils:6.16::el8", "cpe:/a:redhat:satellite_utils:6.16::el9" ]
null
7.3
9.8
null
GHSA-hgx8-vqrh-29gx
An issue in MOKO TECHNOLOGY LTD MOKOSmart MKGW1 BLE Gateway v.1.1.1 and before allows a remote attacker to escalate privileges via the session management component of the administrative web interface.
[]
null
8.8
null
null